No, Openreach.Is the IDNet via City Fibre? If so I have a VLAN configured. IIRC it didn't work until I worked out how to configure that on my PFSense router. So much easy with the Ubiquiti software, I wish I'd switched before.
No, Openreach.Is the IDNet via City Fibre? If so I have a VLAN configured. IIRC it didn't work until I worked out how to configure that on my PFSense router. So much easy with the Ubiquiti software, I wish I'd switched before.



- this is too funny.Best to just not look very often. I kind of want to update to WiFi7 and 6ghz for no reason. But I want a Mesh style one, the Wall on a table mount is tempting though but unsure if that's the same 360deg coverage like the mesh is.Oh balls, why is buying Unifi equipment so addictive?
Depends on so many things, what you want to put in it, I go by the rule of what ever you think you'll need them double it. Even then I've ran out of space. Unifi are releasing fairly deep stuff now as well like the NAS if that interests you.I'm looking at getting the toolless mini rack, Is this worth getting or is there better options about?
Thanks
I have the at the moment UDM Pro and 16 port POE switch (Unifi)Depends on so many things, what you want to put in it, I go by the rule of what ever you think you'll need them double it. Even then I've ran out of space. Unifi are releasing fairly deep stuff now as well like the NAS if that interests you.
I like enclosed racks as well.
I'm still thinking of a UNAS 2bay purely as a backup to the main NAS. I only actually have about 2TB of irreplaceable data, the rest I could actually get hold of again.


Not anymoreYou’ve got way too much money![]()

I forget the terminology but you can still use VLANs but the password you use the connect to the WiFi dictates which VLAN the device uses.A question for those who probably know more than me... I've got a couple of external ethernet connections (one to my car charger & 1 to an external WAP).
What's best practice to secure these connections?
I've implemented MAC filtering on the charger connection, so only that can connect, but I can't do that with the WAP, otherwise nothing can connect through the WAP. I don't really want to put the WAP on a seperate VLAN that can only get to the web, as occasionally I want to be able to access stuff on my home network when I connect to this WAP. Is there a good way to add some security on here? (tbh the likelyhood of someone plugging into that ethernet cable to access my network is practically 0, but I'd rather secure it if possible)
Possibly 802.1x although i would double check Ubiquiti's implementation; last i heard it was WAP/WiFi only and a bit half-baked.What's best practice to secure these connections?
I think @R.C.Anderson meant the physical connection preventing cretins disconnecting a device and hoping on to the network.I forget the terminology...
Yea, I already use different VLANs for different SSIDs for the purpose of iot stuff etc, this is more physical connections to this port, as the cable is in an unsecured location.I forget the terminology but you can still use VLANs but the password you use the connect to the WiFi dictates which VLAN the device uses.
I just have my trusted services correct to the main vlan and iot stuff to a different vlan just set them up as different ssids.
You could turn off DHCP as well and restrict the IP range.
I'll have a look into 802.1x with ubiquiti, see what I can find & if it suits my needs.Possibly 802.1x although i would double check Ubiquiti's implementation; last i heard it was WAP/WiFi only and a bit half-baked.
I think @R.C.Anderson meant the physical connection preventing cretins disconnecting a device and hoping on to the network.
That's pretty much the point I'm at. The likelehood is practically 0, and if someone was so desprate to get into my network, I've probably got bigger problems. I'm still curious from a education perspective though.I would probably just ignore it as a possibility, you could stick the AP on a management VLAN and the client traffic on a different one and hope that nobody can figure the tag out, but nobody is turning up at 3am to take your AP down in order to access your home network outside of well resourced threat actors and if they're targeting you then you've already lost.